Fundamental limits of secure device-to-device coded caching
暂无分享,去创建一个
[1] T. Charles Clancy,et al. Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.
[2] Aydin Sezgin,et al. Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[3] Urs Niesen,et al. Fundamental Limits of Caching , 2014, IEEE Trans. Inf. Theory.
[4] Aylin Yener,et al. Coded caching for resolvable networks with security requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[5] Giuseppe Caire,et al. Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.
[6] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[7] Vinod M. Prabhakaran,et al. Fundamental limits of secretive coded caching , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[8] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[9] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .